Dear CHICKEN users,
the substring-index[-ci] procedures of the data-structures unit are
vulnerable to a buffer overrun attack when passed an integer greater
than zero as the optional START argument. This issue was fixed in master
(25db851) and chicken-5 (63d0445) via the patch discussed at
Hello and happy new year to all!
Peter,
Hm, that's unfortunate. However, I've heard this complaint before.
Do you have any tips on how we can improve the situation?
First, to lighten up spirits a bit: at least for me it was easier to start
with Chicken than with Clojure.
That being said, I
Hi Andrew,
Of course you're right. I've created a ticket[1] to track this issue
(really, a feature request for normal man pages).
Best regards,
Evan
[1]: https://bugs.call-cc.org/ticket/1177
___
Chicken-users mailing list
Chicken-users@nongnu.org
If you have chicken-doc installed, another option is to run e.g.
chicken-doc csi
or consult either of these links, from which the above is taken:
http://api.call-cc.org/doc/csi
http://wiki.call-cc.org/man/4/Using%20the%20interpreter
On Jan 12, 2015, at 12:57, Evan Hanson ev...@foldling.org
Moritz Heidkamp moritz.heidk...@bevuta.com writes:
the substring-index[-ci] procedures of the data-structures unit are
vulnerable to a buffer overrun attack when passed an integer greater
than zero as the optional START argument.
Forgot to mention: As a work-around you can switch to SRFI 13's
Hi Piotr,
I don't have much to add, other than to say that I agree with most of
your points and to thank you for taking the time to write up your
thoughts.
On 2015-01-12 11:49, m...@freeshell.de wrote:
-- an instruction how to get a running IDE with a REPL. I really struggled
here (Sublime